Publication:2724435

From MaRDI portal


zbMath0991.94046MaRDI QIDQ2724435

Tatsuaki Okamoto, David Pointcheval

Publication date: 1 September 2002



94A60: Cryptography

68P25: Data encryption (aspects in computer science)


Related Items

The KDM-CCA Security of REACT, Automated Proofs for Asymmetric Encryption, The Twin Diffie-Hellman Problem and Applications, Gladius: LWR Based Efficient Hybrid Public Key Encryption with Distributed Decryption, Multi-instance secure public-key encryption, QCCA-secure generic transformations in the quantum random oracle model, On the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle model, Fault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidates, Simulation-based bi-selective opening security for public key encryption, Lattice-based authenticated key exchange with tight security, An efficient IND-CCA2 secure Paillier-based cryptosystem, Automated proofs for asymmetric encryption, One-time encryption-key technique for the traditional DL-based encryption scheme with anonymity, Efficient public key encryption with smallest ciphertext expansion from factoring, The twin Diffie-Hellman problem and applications, Secure integration of asymmetric and symmetric encryption schemes, Signcryption schemes with insider security in an ideal permutation model, Practical public key encryption with selective opening security for receivers, Enhancing Goldreich, Goldwasser and Halevi's scheme with intersecting lattices, Subtleties in the definition of IND-CCA: when and how should challenge decryption be disallowed?, An efficient post-quantum KEM from CSIDH, On IND-qCCA security in the ROM and its applications. CPA security is sufficient for TLS 1.3, Generic constructions of identity-based and certificateless kEMs, Tag-KEM/DEM: A new framework for hybrid encryption, Scalable ciphertext compression techniques for post-quantum KEMs and their applications, A New Rabin-type Trapdoor Permutation Equivalent to Factoring, Provably-Secure Remote Memory Attestation for Heap Overflow Protection, Improving Practical UC-Secure Commitments Based on the DDH Assumption, Constructing Secure Hybrid Encryption from Key Encapsulation Mechanism with Authenticity, A practical approach to attaining chosen ciphertext security, Attribute-Based Broadcast Encryption Scheme Made Efficient, Generic Constructions of Stateful Public Key Encryption and Their Applications, Chosen Ciphertext Security with Optimal Ciphertext Overhead, An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations, Strengthening Security of RSA-OAEP, On the Security of Cryptosystems with Quadratic Decryption: The Nicest Cryptanalysis, On the Security of Padding-Based Encryption Schemes – or – Why We Cannot Prove OAEP Secure in the Standard Model


Uses Software